WO2001041356A1 - Carte memoire et systeme de distribution de donnees faisant intervenir une telle carte - Google Patents

Carte memoire et systeme de distribution de donnees faisant intervenir une telle carte Download PDF

Info

Publication number
WO2001041356A1
WO2001041356A1 PCT/JP2000/008544 JP0008544W WO0141356A1 WO 2001041356 A1 WO2001041356 A1 WO 2001041356A1 JP 0008544 W JP0008544 W JP 0008544W WO 0141356 A1 WO0141356 A1 WO 0141356A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
key
information
unit
memory card
Prior art date
Application number
PCT/JP2000/008544
Other languages
English (en)
Japanese (ja)
Inventor
Yoshihiro Hori
Toshiaki Hioki
Miwa Kanamori
Takatoshi Yoshikawa
Hiroshi Takemura
Masataka Takahashi
Takayuki Hasebe
Shigeki Furuta
Takahisa Hatakeyama
Tadaaki Tonegawa
Takeaki Anazawa
Original Assignee
Sanyo Electric Co., Ltd.
Pfu Limited
Fujitsu Limited
Hitachi, Ltd.
Nippon Columbia Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sanyo Electric Co., Ltd., Pfu Limited, Fujitsu Limited, Hitachi, Ltd., Nippon Columbia Co., Ltd. filed Critical Sanyo Electric Co., Ltd.
Priority to US10/130,301 priority Critical patent/US7340055B2/en
Priority to EP00978073A priority patent/EP1237324A4/fr
Priority to AU15574/01A priority patent/AU1557401A/en
Priority to JP2001542505A priority patent/JP3873090B2/ja
Publication of WO2001041356A1 publication Critical patent/WO2001041356A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/108Transfer of content, software, digital rights or licenses
    • G06F21/1088Transfer of content, software, digital rights or licenses by using transactions with atomicity, consistency, or isolation and durability [ACID] properties

Definitions

  • the present invention relates to an information distribution system for distributing information to a terminal such as a mobile phone, and more particularly to a memory card capable of protecting copyright of copied information and a distribution system using the same.
  • information is transmitted by digital signals. Therefore, for example, even when each individual user copies music or video data transmitted in the information communication network as described above, such copying hardly causes deterioration in sound quality or image quality. It is possible to copy data. In other words, when content data, such as music information and image data, for which the author's right exists, is transmitted over such an information and communication network, remarkable measures must be taken to protect copyright. The rights of the copyright owner may be violated.
  • each user records the data distributed in this way on some recording device.
  • the data is reproduced by the reproducing device.
  • a recording device for example, a medium that can electrically write and erase data, such as a memory card, is used.
  • the mobile phone itself used to receive such data distribution may be used, or a recording device may be used from a device that receives distribution such as a memory card. If it is removable, a dedicated playback device can be used.
  • a communication line is required before all distribution of music data etc. is completed.
  • communication may be interrupted.
  • the content data is decrypted with the encrypted encrypted content data and distributed as playback information necessary for playback
  • the communication is interrupted during the delivery of the encrypted content data, re- It is only necessary to receive data continuously, but when the playback information is distributed, the user is billed at the same time. Therefore, the user must retransmit the playback information after reconnecting to such a communication interruption. You will be requesting.
  • Another object of the present invention is that even if communication is interrupted before distribution of reproduction information is completed, distribution of reproduction information can be performed by restarting communication while protecting the rights of the copyright owner.
  • the purpose is to provide a data distribution system that can be completed and a memory card used for it.
  • a memory card for receiving and recording data via an external device, comprising a data communication unit, a first storage unit, an information extraction unit, a second storage unit, and a control unit.
  • the data communication unit establishes a communication path with the transmission source of the reproduction information in order to receive the reproduction information that has been decoded and transmitted.
  • the first storage unit holds data related to reproduction information provided from the data communication unit.
  • the information extraction unit performs a process of storing data related to reproduction information from the data communication unit in the first storage unit, and extracts reproduction information based on the data stored in the first storage unit.
  • the second storage unit records the reception status indicating the processing state in the transmission processing of the reproduction information.
  • the control unit controls the operation of the memory card.
  • the control unit controls transmission of the reception log to the transmission source in response to the request.
  • the data communication unit includes a first key holding unit, a first decryption processing unit, a second key holding unit, a key generation unit, a first encryption processing unit, and a second decryption unit. And a processing unit.
  • the first key holding unit holds a first secret decryption key for decrypting data encrypted with a first public encryption key predetermined for the memory card.
  • the first decryption processing unit receives the first common key, which is updated and transmitted for each communication of the reproduction information and is decrypted with the first public encryption key, and performs a decryption process.
  • the second key holding unit holds a second public key that differs for each memory card.
  • the key generation unit generates a second common key by updating each communication of the reproduction information.
  • the first encryption processing unit encrypts the second public key and the second common key based on the first common key, and outputs the result.
  • the second decryption processing unit receives the reproduction information encrypted with the second public key and further encrypted with the second common key, and decrypts the information based on the second common key.
  • the first storage holds data based on the output of the second decryption processor.
  • the information extraction unit includes a third key holding unit and a third decryption processing unit.
  • the third key holding unit holds a second secret decryption key for decrypting data encrypted with the second public encryption key.
  • the third decryption processing unit performs a decryption process on the second secret decryption key in a process from a process of storing data related to the reproduction information to the first storage unit to a process of extracting the reproduction information.
  • a data distribution system includes a content data supply device and a plurality of terminals.
  • the content data supply device is used for decrypting the encrypted content data and decrypting the encrypted content data into plain text in connection with the reproduction of the encrypted content data.
  • playback information including a content key that is a decryption key of
  • the content data supply device includes a distribution information holding unit, a first interface unit, a first session key generation unit, a session key encryption unit, a session key decryption unit, and a first license data storage unit.
  • the distribution information holding unit holds content data and playback information.
  • the first interface section exchanges data with the outside.
  • the first session key generation unit generates a first common key that is updated every time reproduction information is distributed to a terminal.
  • the session key encrypting unit encrypts the first common key with the first public encryption key predetermined for the user's terminal and provides the encrypted first common key to the first interface unit.
  • the session key decryption unit decrypts the second public encryption key and the second common key that are encrypted and returned using the first common key.
  • the first license data decryption unit decrypts the reproduction information for reproducing the encrypted content data using the second public encryption key decrypted by the session key decryption unit.
  • the second license data symbol processing unit further encrypts the output of the first license data encryption processing unit with the second common key, and provides the output to the first interface unit for distribution.
  • the distribution log information holding unit records a distribution log indicating a processing state during the distribution process.
  • the plurality of terminals receive distribution from the content data supply device via a communication path, and correspond to a plurality of users, respectively.
  • Each terminal includes a second interface unit, a reception control unit, and a data storage unit.
  • the second interface exchanges data with the outside.
  • the reception control unit controls data exchange with the outside.
  • the data storage receives and stores the encrypted content data and the reproduction information.
  • the data storage unit includes: a first storage unit, a first decryption processing unit, a second key storage unit, a key generation unit, a first encryption processing unit, and a second decryption processing unit. , A first storage unit, a third key holding unit, a third decryption processing unit, and a second storage unit.
  • the first key holding unit holds a first secret decryption key for decrypting data decrypted with a first public decryption key that is predetermined corresponding to the data storage unit.
  • the first decryption processing unit receives and decrypts the first common key that has been updated and distributed for each communication of the reproduction information and has been encrypted with the first public encryption key.
  • the second key holding unit holds a different second public encryption key for each data storage unit.
  • the key generation unit generates a second common key by updating the reproduction information every communication. To achieve.
  • the first encryption processing unit encrypts the second public encryption key and the second common key based on the first common key and outputs the result.
  • the second decryption processing unit receives the playback information encrypted with the second public encryption key and further encrypted with the second common key, and decrypts the playback information based on the second common key.
  • the first storage unit holds data based on the output of the second decryption processing unit.
  • the third key holding unit holds a second secret decryption key for decrypting data encrypted with the second public encryption key.
  • the third decryption processing unit performs a decryption process on the second secret decryption key in a process from a process of storing data related to the reproduction information to the first storage unit to a process of extracting the reproduction information.
  • the second storage unit records a reception log indicating the processing status in the distribution process of the encrypted content data and the reproduction information.
  • the reception control unit controls the re-delivery process based on the receiving port when the communication path is disconnected during the distribution process.
  • the server and the memory card retain the distribution history and the distribution state even if there is a deviation, so that the communication is distributed. Even in the case of interruption, the information can be retransmitted by restarting the communication, and the reliability of the distribution process can be improved.
  • FIG. 1 is a conceptual diagram for schematically explaining the overall configuration of the data distribution system of the present invention.
  • FIG. 2 is a diagram illustrating characteristics of data, information, and the like for communication used in the data distribution system shown in FIG.
  • FIG. 3 is a schematic block diagram showing the configuration of the license server 10.
  • FIG. 4 is a schematic block diagram showing the configuration of the mobile phone 100.
  • FIG. 5 is a schematic block diagram showing the configuration of the memory card 110.
  • FIG. 6 is a first flowchart illustrating a distribution operation in the data distribution system according to the first embodiment.
  • FIG. 7 is a second flowchart illustrating the distribution operation in the data distribution system according to the first embodiment.
  • FIG. 8 is a third flowchart illustrating the distribution operation in the data distribution system according to the first embodiment.
  • FIG. 9 is a flowchart for explaining the reconnection processing.
  • FIG. 11 is a second flowchart for explaining a second reconnection operation in the data distribution system according to the first embodiment.
  • FIG. 12 is a third flowchart for explaining a second reconnection operation in the data distribution system according to the first embodiment.
  • FIG. 13 is a flowchart for explaining a third reconnection operation in the data distribution system according to the first embodiment.
  • FIG. 14 is a flowchart for explaining the reconnection process.
  • FIG. 15 is a first flowchart for describing a distribution operation that occurs when a content is purchased in the data distribution system according to the second embodiment.
  • FIG. 16 is a second flowchart illustrating a distribution operation that occurs when a content is purchased in the data distribution system according to the second embodiment.
  • FIG. 17 is a third flowchart illustrating a distribution operation that occurs when a content is purchased in the data distribution system according to the second embodiment.
  • FIG. 18 is a first flowchart for explaining a second reconnection operation in the data distribution system according to the second embodiment.
  • FIG. 19 is a second flowchart for describing a second reconnection operation in the data distribution system according to the second embodiment.
  • FIG. 20 is a third flowchart for explaining the second reconnection operation in the data distribution system according to the second embodiment.
  • FIG. 21 is a first flowchart for explaining a second reconnection operation in the data distribution system according to the third embodiment.
  • FIG. 22 is a second flowchart illustrating a second reconnection operation in the data distribution system according to the third embodiment.
  • FIG. 23 illustrates a second reconnection operation in the data distribution system according to the third embodiment. It is a third flowchart for explanation.
  • FIG. 24 is a fourth flowchart illustrating the second reconnection operation in the data distribution system according to the third embodiment.
  • FIG. 1 is a conceptual diagram for schematically explaining the overall configuration of the data distribution system of the present invention.
  • license server 10 that manages copyrighted music data distributes information after encrypting music data (hereinafter also referred to as content data) using a predetermined encryption method. Give such encrypted data to the mobile carrier, which is the carrier of the delivery carrier 20.
  • the authentication server 12 authenticates and verifies whether or not the user who has accessed for distribution of the content data has accessed using an authorized device.
  • the mobile phone company 20 relays a distribution request (delivery request) from each user to the license server 10 through its own mobile phone network.
  • a distribution request the license server 10 confirms that the user is accessing from an authorized device by the authentication server 12, further encrypts the requested music data, and then encrypts the mobile phone company 2.
  • the content data is distributed to each user's mobile phone via the mobile phone network.
  • a removable memory card 110 is attached to a mobile phone 100 of a mobile phone user 1.
  • the memory card 110 receives the encrypted content data received by the mobile phone 100, and The encryption performed for the communication is decrypted and then given to a music reproduction circuit (not shown) in the mobile phone 100.
  • the user 1 can "play” and listen to such music data via a headphone 130 or the like connected to the mobile phone 100.
  • license server 10 and authentication server 12 and distribution carrier such license server 10 and authentication server 12 and distribution carrier
  • Distribution server 30 Mobile phone company 20 and collectively referred to as distribution server 30.
  • the process of transmitting content data from the distribution server 30 to each mobile phone or the like is referred to as “distribution”.
  • a user who does not have the memory card 110 cannot receive and reproduce distribution data from the distribution server 30.
  • distribution carrier 20 the number of times that content data for one song is distributed, for example, is counted, and copyright fees generated each time a user receives (downloads) content data are counted. If the distribution carrier 20 collects as a mobile phone call fee, it becomes easy for the copyright holder to secure the copyright fee.
  • the content data received by user 1 is The case where the data is copied to the user 2 together with the data itself and the reproduction information necessary to make the content data reproducible is called “movement” of the music data.
  • the encrypted content data and playback information necessary for playback are moved between the memory cards 110 and 112 via the mobile phones 100 and 102.
  • the “reproduction information” is, as described later, a license key capable of decrypting content data encrypted according to a predetermined encryption method, restriction information on access reproduction, and a content ID. And other license information.
  • copying without moving the playback information, that is, copying only the content data is called “duplication”. Since duplication does not involve movement of reproduction information, the user who has received the duplication requests the distribution server 30 to distribute only the reproduction information, and is ready for reproduction. In this case, distribution of a considerable amount of data in distribution of content data can be omitted.
  • the receiver can flexibly use the content data once distributed by the distribution server.
  • transceiver mode communication is possible, and such a function is used to communicate with the user 1. It is possible to transfer information to and from user 2.
  • the system requires that the content data distributed in encrypted form be reproducible on the user side.
  • the second is the method of encrypting the distribution data itself.
  • the third is data protection to prevent unauthorized copying of the data thus distributed. This is a configuration for realizing.
  • the state and the history during distribution are recorded and retained on both the transmitting side and the receiving side of the information, and even if the communication is interrupted during the distribution, the information is retransmitted by resuming the communication.
  • the following describes a delivery system that enables the above and improves the reliability of the delivery process.
  • Figure 2 shows the data transmission system used in the data distribution system shown in Figure 1. It is a figure explaining the characteristics of data, 'information, etc.
  • the data Data distributed from the distribution server 3 ⁇ is content data such as music data.
  • the content server Data is in the form of an encrypted content data (Data) Kc that has been encrypted at least by the license key Kc and is distributed to the distribution server 30. More distributed to users.
  • the notation ⁇ Y ⁇ X indicates that the data Y is information obtained by converting the data Y into a cipher that can be decrypted by the key data X.
  • the distribution server distributes the content data and additional information Data-inf as plain text information related to the content data or server access. That is, the additional information Data-inf includes information for specifying the content data such as the title of the content data and the name of the taste, and information for specifying which server is the distribution server 30. It is. -Next, the following are the keys related to the encryption / decryption / reproduction processing of content data and the authentication of the portable telephone as the reproduction circuit and the memory card as the recording medium. That is, as described above, the license key Kc for decrypting the encrypted content data, the public key key KPp ( ⁇ ) unique to the content reproduction circuit (mobile phone 100), and the public key unique to the memory card. An encryption key KPmc (m) is provided for each.
  • the secret decryption key Kp ( ⁇ ) unique to the content reproduction circuit (cellular phone 100) and the secret decryption unique to the memory card Each can be decrypted with the key Kmc (m).
  • These unique secret decryption keys have different contents for each type of mobile phone and each type of memory card.
  • the types of mobile phones and memory cards are defined based on the manufacturers and the types of products that manufacture them, and the differences in the manufacturing period (production lot).
  • the unit to which the public key and the private decryption key are assigned is called a class.
  • the natural numbers m and n represent numbers for distinguishing the class of each memory card and content reproduction circuit (cellular phone).
  • a secret key used mainly for obtaining a license key Kc and restriction information for a reproduction circuit described later.
  • the secret common key Kcom is held on both the distribution server and the mobile phone.
  • the validity of the public encryption keys KPmc (m) and KPp ( ⁇ ) set for each memory card and content reproduction circuit described above can be confirmed by decrypting with the authentication key KPma. That is, the authentication data to be authenticated is recorded in the format of ⁇ KPmc (m) ⁇ KPma and Pp (n) ⁇ KPraa on the memory card and mobile phone at the time of shipment.
  • the secret common key Kcom is not limited to the common key method, and can be operated by replacing the secret decryption key and the public key key KPcom in the public key method.
  • the mobile phone 100 stores the public decryption key Kpcom as the encryption key in the distribution server 30.
  • the mobile phone 100 and the memory card 110 which are content reproduction circuits the mobile phone
  • reproduction circuit restriction information AC2 which is distributed to the telephone mi00 and indicates the restriction on the reproduction conditions of the reproduction circuit.
  • the playback conditions of the playback circuit refer to conditions such as permission to play back only a predetermined time at the beginning of each content data and playback time limit, for example, when distributing samples at a low price or free of charge as a promotion of a new song. .
  • a public encryption key KPm (i) (i ⁇ natural number) unique to each memory card set individually for each medium such as a memory card
  • KPm (i) i ⁇ natural number
  • Km (i) a unique secret decryption key for each memory card capable of decrypting data encrypted with the public signal KPm (i).
  • the natural number i represents a number for distinguishing each memory card.
  • the server 30 and the mobile phone 100 or 100 2 are used as keys for maintaining confidentiality in data transfer between the memory card and the outside of the memory card every time content data is distributed, reproduced, or moved.
  • the common keys Ks1 to Ks4 generated in the memory card 110 or 112 are used.
  • the common keys Ksl to Ks4 are unique common keys generated for each “session” which is a unit of communication or access between the server, the mobile phone, or the memory card.
  • the keys Ksl to Ks4 are also referred to as “session keys”.
  • These session keys Ks1 to Ks4 are managed by the distribution server, the mobile phone, and the memory card by having a unique value for each communication session.
  • the session key Ksl is generated by the distribution server 30 for each distribution session.
  • the session key Ks 2 is generated for each distribution session and movement (reception side) session by the memory card, and the session key Ks 3 is similarly generated for each reproduction session and movement (transmission side) session on the memory card.
  • the session key Ks4 is generated for each playback session on the mobile phone. In each session, these session keys are exchanged, a session key generated by another device is received, encryption is performed by this session key, and a license key is transmitted. Security strength can be improved.
  • the data exchanged with the distribution server includes a content ID for the system to identify the content data, and when and to whom the playback information was issued.
  • a transaction ID that is generated and is a code to identify each distribution session. Note that the license ID and the transaction ID may be shared.
  • the license ID, the content ID, and the access restriction information AC1 are collectively referred to as license information, and the license information, the license key Kc, and the reproduction circuit restriction information AC2 are collectively referred to as reproduction information.
  • FIG. 3 is a schematic block diagram showing the configuration of the license server 10 shown in FIG. .
  • the license server 10 follows the information database 304 that holds the data obtained by encrypting the content data according to the predetermined method, the distribution information such as the content ID, and the start of access to the content data for each user.
  • Billing database 302 for storing billing information
  • log management database 306 for holding license server log information
  • information database 304 billing database 302
  • a data processing unit 310 for receiving data from the management database 300 via the data bus BS 1 and performing predetermined processing, a distribution carrier 20 and a data processing unit via a communication network.
  • a communication device 350 for exchanging data with 310.
  • the license distribution log J indicating the history of distribution of license information held in the log management database 306 includes transaction ID, content ID, public encryption key KPmc (n), KPp ( ⁇ ), access There is information such as restriction information AC1, playback circuit restriction information AC2, public encryption key KPm (i), session key Ks2, charging status flag, etc.
  • the charging status flag has already completed the charging process for the content data being distributed. This is a flag indicating whether or not it is in use.
  • the data processing unit 310 is controlled by a distribution control unit 315 for controlling the operation of the data processing unit 310 according to data on the data bus BS1, and a distribution control unit 315. And a session key generator 316 for generating a session key Ksl during a distribution session, and authentication data ⁇ KPmc (n) ⁇ KPma and ⁇ KPp sent from a memory card and a mobile phone for authentication. (n) ⁇
  • the KPma is received from the communication device 350 and the data bus BS1, and is decrypted by the decryption processing unit 312 that decrypts the authenticated KPma and the session key generation unit 316.
  • the data processing section 31 1 ⁇ further stores the Kcom holding section 3 2 2 for holding the secret common key Kcom, the license key Kc and the reproduction circuit restriction information AC 2 given from the distribution control section 3 15 5 into the secret common key Kcom.
  • the encryption processing section 326 for encryption and the output of the encryption processing section 326 are further encrypted by the session key Ks2 provided from the decryption processing section 320 and output to the data bus BS1.
  • the holding unit 3 22 holding the key data is replaced with the public key cryptosystem key in place of the secret common key Kcom in the common key system. Holds the public encryption key KPcotii.
  • FIG. 4 is a schematic block diagram for explaining the configuration of mobile phone 100 shown in FIG.
  • the mobile phone 100 receives an antenna 1102 for receiving a signal wirelessly transmitted by a mobile phone network, and receives a signal from the antenna 1102 and converts it into a base-spread signal.
  • Transmission / reception section 1104 for modulating data from the antenna and providing it to antenna 1102, data bus BS2 for transmitting / receiving data to / from each section of mobile phone 100, and data bus BS2.
  • a controller 1106 for controlling the operation of the mobile phone 100.
  • the mobile phone 100 further transmits to the user a keyboard 111 for giving external instructions to the mobile phone 100 and information output from the controller 110, etc.
  • the mobile phone 100 further includes a removable memory card 110 for storing and decrypting content data (music data) from the distribution server 30, a memory card 110, and data.
  • the memory interface 12000 for controlling the exchange of data with the bus BS 2 and the public key KPp (1) set for each class of mobile phone are decrypted with the authentication key KPma.
  • An authentication data holding unit 1500 that holds data encrypted in an authenticable state is included.
  • the data received from the bus BS 2 is decrypted with the secret decryption key ⁇ (1) to obtain the session key Ks 3 generated by the memory card.
  • a generating unit 1508 an encryption processing unit 1506 that encrypts the generated session key Ks4 with the session key Ks3 obtained by the decryption processing unit 1504 and outputs it to the data bus BS2.
  • the mobile phone 100 further decrypts the data ⁇ Kc ⁇ AC 2 ⁇ Kcom output by the Kcom holding unit 1512 holding the secret common key Kcom and the decryption processing unit 15010 with the secret common key Kcom.
  • the decryption processing section 15 receives the encrypted content data ⁇ Data ⁇ c from the data bus BS 2 and the decryption processing section 15
  • the decryption processing unit 15 16 that obtains the content data D ata obtained from 14 and decrypts it with the license key Kc to output the content data D ata, and receives the content data D ata output from the decryption processing unit 15 16
  • Switching section for receiving the outputs of the music playback section 15 18 and the music playback section 15 18 and the audio playback section 11 12 1 5 2 5 and the connection terminal 1 5 3 0 for receiving the output of the switching section 1 5 2 5 and connecting to the headphone 1 3 0 Including.
  • the reproduction circuit restriction information AC2 output from the decryption processing section
  • FIG. 4 for simplicity of description, only the blocks related to the distribution of music data of the present invention are shown in the mobile phone, and a part of a call related to a call function originally provided in the mobile phone is omitted. are doing.
  • FIG. 5 is a schematic block diagram for explaining the configuration of memory card 110 shown in FIG.
  • the memory card 110 has an authentication data holding unit 1400 that holds the authentication data ⁇ KPmc (1) ⁇ KPma, and Kmc (1), which is a unique decryption key set for each memory card class. ), A public key key KPm (1) holding a public encryption key KPm (1) uniquely set for each memory card, and a public encryption key Km (1) holding unit 1442 1 for holding an asymmetric secret decryption key Km (1) that can be decrypted by KPm (1).
  • the authentication data holding unit 140 ⁇ holds and encrypts the public encryption key KPmc (1) set for each memory card class with the authentication key KPma so that its validity can be authenticated. I do.
  • the memory card 110 further provides a data bus BS 3 for transmitting and receiving signals to and from the memory interface 120 0 via the terminal 122, and provides the data bus BS 3 with the data bus BS 3 from the memory interface 120 0.
  • the secret key Kmc (1) unique to each memory card class is received from the Kmc (1) holding unit 1402 from the data to be transmitted, and the sensitivity key Ks 3 generated by the distribution server in the distribution session is sent to the contact point Pa. It receives the authentication key Pma from the decryption processing unit 1444 and the KPma holding unit 14443, and performs decryption processing using the authentication key KPma from the data supplied to the data bus BS3 to perform decryption.
  • the decryption processing unit 1408 that outputs the W result to the encryption processing unit 14010, and the key data selectively supplied by the switching switch 1442, the key selectively supplied by the switching switch 1444. It includes an encoding processor 1406 that converts a block into a loop and outputs it to the Bouquet pass 3.
  • the memory card 110 further includes a session key generating section 144 for generating a session key in each of distribution, playback, and moving sessions, and a session key output from the session key generating section 144.
  • Processing unit 1410 that encrypts the data with the public encryption key KPp ( ⁇ ) obtained by the decryption processing unit 1408 and outputs it to the data bus BS3.
  • a decryption processing unit 1412 for decrypting with the session key Ks3 obtained from the one generation unit 1418 and transmitting the decryption result to the data bus BS4.
  • the memory card 110 further uses the public encryption key KPm (i) (i can be 1 or the number j of another memory card) for the data on the data bus BS4 in a distribution or mobile session. Decryption for decrypting the data on the data bus BS4 with the encryption processing unit 1 24 and the public encryption key KPm (1) and the secret key Km (1) unique to the memory card 110.
  • a part for receiving and storing the encrypted content data ⁇ Data ⁇ Kc from the data bus BS3 and a part for receiving and storing the encrypted content data ⁇ Data ⁇ Kc from the data bus BS4 are included.
  • the mobile phone 110 further includes a license information holding unit 1440 for holding license information (transactions, content ID and access restriction information AC1) obtained by the decryption processing unit 1442, and a memory capacity.
  • a license information holding unit 1440 for holding license information (transactions, content ID and access restriction information AC1) obtained by the decryption processing unit 1442, and a memory capacity.
  • Memory for holding logs related to the transmission / reception of playback information in the data bus, and exchanges data with the outside via the data bus BS3 and receives playback information etc. with the data bus BS4.
  • a controller 142 for controlling the operation of the memory card 110.
  • reception log This is called a “reception log” that indicates the reception status of the playback information held in the log memory 1460.
  • the reception information is data generated when the license is received, and is deleted when the reproduction information is completely received and stored in the memory card 110. Left.
  • the area TRM surrounded by a solid line indicates that, if the memory card 110 is subjected to an unlawful opening process from the outside, the internal data is erased. It is assumed that the module is incorporated in the module TRM for disabling the reading of data in the circuit existing in the area.
  • Such a mojiyunore is generally Tanha. It is one resistance module (Tamper.Resistance Module).
  • the configuration including the memories 14 and 15 may be incorporated in the module TRM.
  • any data held in the memory 14 15 is encrypted data. It is impossible to play music from the content data with only the data in (5), and it is not necessary to provide the memory (14) (15) in the expensive tamper resistance module, so the manufacturing cost is reduced.
  • FIGS. 6, 7, and 8 are first, second, and third diagrams for explaining a distribution operation (hereinafter, also referred to as a distribution session) that occurs when content data is purchased in the data distribution system according to the first embodiment. It is a flowchart.
  • 6 to 8 illustrate the operation when user 1 receives music data distribution from broadcast server 30 via mobile phone 100 by using memory card 110. are doing. '
  • the user 1 makes a distribution request by operating the key buttons of the keyboard 111 of the mobile phone 100 (step S100).
  • the memory card 110 stores authentication data in response to this distribution request.
  • Authentication data ⁇ KPmc (1) ⁇ KPma is output from the holding unit 1400 (step S102). '
  • the mobile phone 100 receives authentication data ⁇ KPmc (1) ⁇ for authentication of the mobile phone 100 itself in addition to the authentication data ⁇ KPmc (1) ⁇ KPma received from the memory card 110.
  • the KPma, the content ID, and the license purchase condition AC are transmitted to the distribution server 30 (step S104).
  • the distribution server 30 receives the content ID, the authentication data ⁇ KPmc (1) ⁇ KPma, ⁇ KPp (1) ⁇ KPma, and the license purchase condition AC from the mobile phone 100 (step S106), and the decryption processing unit 31 In step 2, decryption processing is performed using the authentication key KPma, and KPmc (1), which is the public encryption key of the memory card 110, and KPp (1), which is the public encryption key of the mobile phone 100, are received (step S 108).
  • distribution control section 315 Based on the received public encryption keys KPmc (1) and KPp (1), distribution control section 315 makes an inquiry to authentication server 12 (step S110), and these public encryption keys are used. If the public key is valid, the process proceeds to the next process (step SI12), and if the public key is invalid, the process ends (step S170).
  • the authentication server 12 when the validity of the public key key KPp (1) or KPmc (l) is verified, the authentication server 12 is referred to, but the public encryption key KPp Since (l) and KPmc (l) are each encrypted by being decrypted with the authentication key KPma, the validity of which can be determined, the distribution control unit 3 15 of the license server 10 It is also possible to adopt a configuration in which authentication is performed independently from the result of decryption using the authentication key KPma.
  • the delivery control unit 315 next generates a transaction ID for identifying the delivery session (step S1). 12).
  • the distribution control unit 3 15 further sets the transaction, the content ID, and the public key KPmc (1), KPp (1) Is recorded as a license distribution log in the management database 306 (step S113) together with the information that the account has not been charged (charging status flag).
  • Delivery Generate a session key Ks 1 for The session key Ksl is encrypted by the encryption processing unit 318 using the public encryption key KPmc (1) corresponding to the memory card 110 obtained by the decryption processing unit 312 (step S114). .
  • the transaction ID and the encrypted session key ⁇ Ksl ⁇ Kmc (1) are output to the outside via the data bus BS1 and the communication device 350 (step S116).
  • the memory card 110 receives, via the memory interface 1200, The received data is provided to the data bus BS3.
  • Decryption processing unit 1404 The session key Ksl is decrypted by decrypting ⁇ Ks 1 ⁇ Kmc (1) with the secret key Kmc (1) unique to memory 1101 stored in the storage unit 1402. Then, the transaction ID and the session key Ks1 are accepted (step S120).
  • step S120 The processing up to step S120 up to this point is referred to as “transaction ID acquisition step”.
  • controller 1420 when controller 1420 confirms the reception of session key Ksl generated by distribution server 30, controller 1420 instructs session key generator 1418 to generate a session key generated during the distribution operation in the memory card. Instruct generation of Ks2. Further, the controller 1420 receives the session key Ks2 together with the received transaction ID.
  • the data is recorded in the log memory 1460 as a log (step S122).
  • the encryption processing unit 1406 is provided with a session key Ks 2 provided by sequentially switching the contacts of the switching switches 1444 and 1446 by the session key Ks 1 provided from the decryption processing unit 1404 via the contact Pa of the switching switch 1442, and
  • the public key key KPm (1) is encrypted, and ⁇ Ks2 ⁇ KPm (1) ⁇ Ks1 is output to the data bus BS3 (step S122).
  • the encrypted data ⁇ Ks2 ⁇ KPm (1) ⁇ output to the data bus BS3 is transmitted from the data bus BS3 to the mobile phone 100 via the terminal 1.202 and the memory interface 120, and is transmitted to the mobile phone 100.
  • Distribution server 30 receives encrypted data ⁇ Ks2sKPm (1) ⁇ Ksl, executes decryption processing by session key Ks1 in decryption processing section 320, and outputs session key KS2 and KS2 generated by the memory card.
  • the public key KPm (1) unique to the memory card 110 is received (step S126).
  • distribution control section 315 generates access restriction information AC1 and reproduction circuit restriction information AC2 according to the content ID and license purchase condition data AC acquired in step S106 (step S130). Further, a license key Kc for decrypting the encrypted content data is obtained from the information database 304 (step S132).
  • the distribution control unit 315 gives the obtained license key Kc and the reproduction circuit restriction information AC2 to the encryption processing unit 324.
  • the encryption processing unit 324 encrypts the license key Kc and the reproduction circuit restriction information AC2 with the secret common key Kcom obtained from the Kcom holding city 322 (step S134).
  • the encryption processing unit 328 receives the output of the encryption processing unit 326, and encrypts it using the session key Ks2 generated in the memory card 110 (step S137).
  • the distribution control unit 315 stores the access restriction information AC1, the reproduction circuit restriction information AC2, the public encryption key KPm (l), the session key Ks2 in the log data management database 306, and charged information (charging status flag). (Step S138).
  • the encrypted data ⁇ Kc // AC2 ⁇ Kcom ⁇ transaction ⁇ D ⁇ content ID ⁇ AC1 ⁇ Km (l) ⁇ Ks2 output from the encryption processing unit 328 transmits the data bus BSl and the communication device 350 It is transmitted to the mobile phone 100 via the mobile phone 100 (step S139). In this way, the sessions generated by the sending server and the memory card respectively Keys are exchanged, encryption is performed using the encryption key received by each other, and the encrypted data is transmitted to the other party. This can improve the security of the data distribution system. Further, the distribution server 30 records and retains information relating to the charging status and the distribution history.
  • the mobile phone 100 receives the transmitted encrypted data ⁇ ⁇ Kc // AC2 ⁇ Kcom ⁇ transaction ID ⁇ content ID ⁇ AC1 ⁇ Km (l) ⁇ Ks2 (step SI 40), and receives the memory card 1 In 10, the received data supplied to the data bus BS3 via the memory interface 1200 is decoded by the decoding processing unit 1412. That is, the decryption processing section 141 2 decrypts the received data on the data bus BS 3 using the session key Ks 2 given from the session key generation section 1418 and outputs the data to the data bus BS 4 (step S 144).
  • step S 144 data that can be decrypted with secret decryption key Km (1) held in Km (1) holding unit 142 1 is placed on data bus BS 4 ⁇ Kc // AC2 ⁇ Kcom ⁇ license ID ⁇ content ID ⁇ AC1 ⁇ Km (l) is output.
  • step S150 The processing from step S122 to step S150 is referred to as "reproduction information acquisition step J. This" reproduction " In the “information acquisition step”, a process for charging is performed.
  • the mobile phone 100 A distribution request for the content data is made to the distribution server 30 (Step S152).
  • the distribution server 30 receives the content data distribution request, obtains the encrypted content data ⁇ Data ⁇ Kc and the additional information DATA-inf from the information database 304, and transmits these data to the data bus. Output via BS1 and communication device 350 (step S154).
  • the mobile phone 100 receives ⁇ Data ⁇ Kc // Data-inf and receives the encrypted content data ⁇ Data ⁇ Kc and the additional information Data-inf (step S156).
  • the encrypted content data ⁇ Data ⁇ Kc and the additional information Data-inf are transmitted to the data bus BS3 of the memory card 110 via the memory interface 120 and the terminals 1, 202.
  • the received encrypted content data ⁇ Data ⁇ Kc and the additional information Data-inf are stored as they are in the memory 1415 (step S158).
  • step S152 to step S158 will be referred to as “content data acquisition step”.
  • content data acquisition step processing that is not subject to charges is performed.
  • a notification of the receipt of the distribution is transmitted from the memory card 110 to the distribution server 30 (step S160), and when the distribution server 30 receives the distribution receipt (step S16). 2)
  • the delivery end processing is executed with the storage of the billing data in the billing database 302 (step S1664), and the processing of the delivery server ends (step S170) ).
  • FIG. 9 is a flowchart for explaining the reconnection processing.
  • a request for reconnection is made by operating a key button of the keyboard 110 of the mobile phone 100, and the reconnection process is started (step S200).
  • step S202 the controller 1106 of the mobile phone 100 determines which of the processes in which the communication is disconnected is being processed.
  • the basic distribution processing (first reconnection processing) shown in FIGS. 6 to 8 is redone (step S204), and the reconnection processing ends. (Step S206).
  • step S202 the controller 1106 performs a second reconnection process based on the reception log described later (step S2). 0 6) or in the case of the content data acquisition step (step S 202), a third reconnection process is performed to continue the communication when the communication is disconnected, which will be described later (step S 202). 206), the reconnection process ends (step S210).
  • FIGS. 10, 11, and 12 are first, second, and third flowcharts for explaining the above-described second reconnection operation in the data distribution system according to the first embodiment. It is.
  • the license distribution log of the license server 10 With the reception port of the memory card 110, it is possible to check the distribution status of playback information at the time of communication disconnection, protect the rights of the copyright owner, Is to achieve the guarantee.
  • a reconnection request is made by the user 1 by operating the key buttons of the keyboard 110 of the mobile phone 100.
  • the second reconnection processing is performed. Is started (temp S 300).
  • the memory card 110 In response to the reconnection request, the memory card 110 outputs the transaction ID stored in the log memory 144 (step S302). The mobile phone 100 transmits the transaction ID received from the 'memory card 110' to the distribution server 30 (step S304).
  • the distribution server 30 receives the transaction ID (step S306), and searches the license distribution log in the distribution control unit 310 log management database 36 (step S308). ).
  • the delivery control unit 315 determines that the terminal (mobile phone 10 ⁇ and memory card 110) that has requested reconnection from the received transaction ID has already been charged ( In step S308), the public encryption key KPmc (1) is obtained from the license distribution log (step S310).
  • the session key generation unit 316 generates a session key Ksl for distribution.
  • the session key Ks1 is encrypted by the encryption processing unit 318 using the public key key KPmc (1) (step S312).
  • the transaction ID and the encrypted session key ⁇ Ksl ⁇ Kmc (1) are output to the outside via the data bus BS1 and the communication device 350 (step S314).
  • step S 3 16 Upon receiving the transaction ID and the encrypted session key ⁇ Ks 1 ⁇ Kmc (1) (step S 3 16), in the memory card 110, via the memory interface]. 200, The reception key given to the data bus BS3 is decrypted with the secret decryption key Kmc (1) unique to the memory card 110 held in the decryption processing unit 1404 power holding unit 1402, thereby decoding the session key Ksl. Extract (step S3 18).
  • step S121 shown in FIG. 7 that is, the same processing as the processing after the license obtaining step is performed.
  • step 308 the distribution control unit 315 sets the log management database
  • Step S330 the public encryption key KPmc (1) is obtained from the license distribution log.
  • the session key generator 316 generates a session key Ks1 for distribution.
  • the session key Ksl is encrypted by the encryption processing unit 318 using the public key KPmc (1) (step S332).
  • the transaction ID and the encrypted session key ⁇ Ksl ⁇ Kmc (1) are output to the outside via the data bus BS1 and the communication device 350 (step S334).
  • the memory card 110 receives the data supplied to the data bus BS 3 via the memory interface 1 2.00 and decodes the received data into the decoding processing unit 1404. By decrypting with the secret decryption key Kmc (1) unique to the memory card 110 held in the holding unit 1402. The key Ks1 is decrypted and extracted (step S338).
  • the encryption processing unit 1406 encrypts the reception log with the session key Ks1, and generates a ⁇ reception log ⁇ Ksl (step S340).
  • controller 1420 instructs session key generating section 1418 to generate session key Ks21 generated during the distribution operation in the memory card (step S342).
  • the encryption processing unit 1406 encrypts the session key Ks 2 ′ given via the contact points of the switching switches 1444 and 1446 by using the session key Ks 1 given from the decryption processing unit 1404 via the contact point Pa of the switching switch 1442. , ⁇ Ks2 ' ⁇ generate Ksl. Data generated as above ⁇ Reception log ⁇
  • Ksl and ⁇ Ks2 ' ⁇ Ksl are output from memory card 110 (step S 3
  • the encrypted data ⁇ reception log ⁇ Ksl and ⁇ Ks2 ′ ⁇ Ks1 output to the data bus BS3 are transmitted from the data bus BS3 to the mobile phone 100 via the terminal 1202 and the memory interface 1200, and are transmitted to the mobile phone 100. Is transmitted to the distribution server 30 (step S346).
  • the distribution server 30 receives the encrypted data ⁇ reception log ⁇ Ksl and ⁇ Ks2 ' ⁇ Ksl, executes the decryption processing by the session key Ksl in the decryption processing unit 320, and executes the reception log and the session generated by the memory card.
  • the key Ks2 ' is accepted (step S348).
  • the distribution control unit 315 checks the validity of the received reception log (step S350).
  • step S390 If it is determined that the received log is not valid, the second reconnection process ends (step S390).
  • the distribution control unit 315 determines from the license distribution log the content ID, access restriction information AC1, reproduction circuit restriction information AC2, and public key key KPm (l ) (Step S352). Further, a license key Kc for decrypting the encrypted content data is obtained from the information database 304 (step S354). The distribution control unit 315 gives the obtained license key Kc and the reproduction circuit restriction information AC2 to the encryption processing unit 324. The encryption processing unit 324 encrypts the license key Kc and the reproduction circuit control information AC2 with the secret common key Kcom obtained from the Kcom holding unit 322 (step S356).
  • the encrypted data ⁇ Kc ⁇ AC2 ⁇ Kcom output from the encryption processing unit 324 and the transaction ID, content ID, and access restriction information AC1 output from the distribution control unit 315 are converted by the encryption processing unit 326 into steps.
  • the memory card 110 obtained in S 352 is encrypted by the unique public key number KPm (1) (step S 358).
  • the encryption processing unit 328 receives the output of the encryption processing unit 326, and
  • the encryption is performed using the session key Ks2 "generated in step 10 (step S360).
  • the encrypted data ⁇ c // AC2 ⁇ Kcom ⁇ transaction ID ⁇ content ID ⁇ AC1 ⁇ Km (l) ⁇ Ks2 'output from the encryption processing unit 328 is the data bus BS1 and the notification device.
  • the message is transmitted to the mobile phone 10 through 350 (step S362).
  • the mobile phone 100 receives the transmitted encrypted data ⁇ Kc // AC2 ⁇ Kcom ⁇ transaction ID ⁇ content ID ⁇ AC1 ⁇ Km (l) ⁇ Ks2 '(step S364).
  • memory interface 1 In memory card 110, memory interface 1
  • the received data provided to the data bus BS3 via the data bus 200 is decoded by the decoding processing unit 1412. That is, the decryption processing unit 1412 decrypts the data received on the data bus BS3 using the session key Ks2 ′ given from the session key generation unit 1418 and outputs the data to the data bus BS4 (step S366).
  • the data bus BS4 includes the data that can be decrypted with the secret decryption key Km (1) held in the Km (1) holding unit 142 1 ⁇ Kc // AC 2 ⁇ Kcom ⁇ license ID ⁇ content ID ⁇ AC1 ⁇ Km (l) is output.
  • data ⁇ Kc ⁇ AC2 ⁇ Kconu transaction that is decrypted with the secret decryption key Km (l) and is the playback information Yon ID, content ID, and access restriction information AC1 are accepted (step S368).
  • the transaction ID, the content ID, and the access restriction information AC1 are recorded in the license information holding unit 1440.
  • the data ⁇ Kc; ⁇ AC2 ⁇ Kcom is again encrypted with the secret decryption key KPm (l) and stored in the memory 14 15 as data ⁇ Kc // AC2 ⁇ Kcom ⁇ Km (1) ( Step S370).
  • step S372 the reception log in the log memory 1460 is deleted (step S372).
  • a request for distribution of content data is made from the mobile phone 100 to the distribution server 30 (step S374).
  • the distribution server 30 receives the content data distribution request and
  • step S376 encrypted content data ⁇ Data ⁇ Kc and additional information DATA-inf are obtained, and these data are output via data bus BS1 and communication device 350 (step S376).
  • Mobile phone 100 receives ⁇ Data ⁇ Kc // Data-inf and receives encrypted content data ⁇ Data ⁇ Kc and additional information Data-inf (step S378).
  • the encrypted content data ⁇ Data ⁇ Kc and additional information Data-inf are transmitted to the data bus BS3 of the memory card 110 via the memory interface 1200 and the terminal 1202.
  • the received encrypted content data ⁇ Data ⁇ Kc and the additional information Data-inf are stored as they are in the memory 14 15 (step S 380).
  • a notification of the reception of the distribution is transmitted from the memory card 110 to the distribution server 30 (step S382).
  • the process of terminating the distribution is executed (step S384).
  • S386) the processing of the distribution server ends (step S390).
  • FIG. 13 is a flowchart for explaining the above-described third reconnection operation in the data distribution system according to the first embodiment.
  • connection processing is started (step S400).
  • the mobile phone 1 • 0 makes a distribution data distribution request to the distribution server 30 (step S402).
  • the distribution server 30 receives the content data distribution request, acquires the encrypted content data ⁇ Data ⁇ c and the additional information DATA-inf from the information database 304, and transmits these data to the data bus BS1 and the communication device. Output via 350 (step S404).
  • the mobile phone 100 receives the ⁇ Data ⁇ Kc // Data-inf and receives the encrypted content data ⁇ Data ⁇ Kc and the additional information Data-inf (step S406).
  • ⁇ Data ⁇ Kc and additional information Data-inf are transmitted to the data bus BS 3 of the memory card 110 via the memory interface 1200 and the terminal 1202. In the memory card 110, the received encrypted content is transmitted.
  • the data ⁇ Data ⁇ Kc and the additional information Data-inf are stored as they are in the memory 1415 (step S408).
  • a notification of distribution acceptance is transmitted from the memory card 110 to the distribution server 30 (step S 410).
  • the distribution server 30 receives the distribution acceptance (step S 412)
  • the distribution termination processing is executed. (Step S414), the processing of the distribution server ends (Step S416).
  • FIG. 14 is a flowchart for explaining such a reconnection process.
  • a reconnection request is made by operating a key button of the keyboard 1108 of the user 1t mobile phone 100, and a reconnection process is started (step S500).
  • the controller 1106 determines which of the processes of the step in which the communication was cut off (step S502), That is the licensing step or If it is a relicense acquisition step, the second reconnection process is performed again (step S504), and the reconnection process ends (step S508).
  • step S502 the step in which the message was disconnected is the content data acquisition step (step S502), the controller 1106 performs the third reconnection process described later (step S5). 06), the reconnection processing ends (step S508).
  • the license reception waiting held in the log memory 1460 in the memory card 110 is performed.
  • the feature is that the log is not deleted.
  • the reception log has a configuration in which a reception status flag is further added to the configuration of the first embodiment.
  • the configuration of the data distribution system of the second embodiment is different from that of the first embodiment in that the operation of the controller 144 in the memory card 110 and the data held in the Different from the case.
  • FIG. 15, FIG. 16 and FIG. 17 are first, second and third flowcharts for explaining a distribution operation that occurs at the time of content purchase in the data distribution system according to the second embodiment.
  • FIG. 9 is a diagram to be compared with FIGS.
  • FIGS. 15 to 17 also describe the operation when music data is distributed from the distribution server 30 via the mobile phone 100 by using the user's memory card 110. .
  • the controller 1420' s the session key generated by the distribution server 30.
  • the session key generation unit 144 is instructed to generate a session key Ks2 generated at the time of distribution operation in the memory card.
  • the controller 1420 sets the session key to Ks2, the received transaction ID, and the ON state indicating that it is waiting to receive.
  • the changed reception status flag is recorded as a reception log in the log memory 1460 (step S122).
  • step S148 transaction ID, content ID, and access restriction information AC1 are recorded in license information holding unit 1440.
  • the data ⁇ Kc ⁇ AC2 ⁇ Kcom is again encrypted with the public encryption key KPm (l) and stored as ⁇ Kc // AC2 ⁇ Kcom ⁇ Km ()> in the memory 1415.
  • the reception state flag in the reception log is set to the off state indicating that the reception has been completed (step S150 ').
  • FIGS. 18, 19 and 20 are first, second and third flowcharts for explaining the above-described second reconnection operation in the data distribution system according to the second embodiment.
  • FIG. 13 is a diagram to be compared with FIGS. 10 to 12 of FIG. 1.
  • step S121 shows the transaction ID, the content ID, and the access restriction information.
  • the data iKc / AC2 ⁇ Kcom is again encrypted with the public key KPm (l) and stored in the memory 1415 as data ⁇ c // AC2 ⁇ Kcom ⁇ Km (l).
  • the configuration is such that the reception state flag of the reception log is set to the off state indicating that the reception has been completed.
  • Other processes are the same as those of the first embodiment, and thus the same processes are denoted by the same reference characters and description thereof will not be repeated.
  • the third reconnection processing and the reconnection operation when the line is disconnected during the reconnection operation are the same as the processing of the first embodiment.
  • the reception log stored in the log memory 14.6 in the memory card 110 includes: The point is that the status information with the status flag added is transmitted to the server.
  • the status information includes a transaction ID, which is a reception log, a session key Ks2, a reception status flag and a status flag.
  • the license status flag is a flag variable that takes three states, and the transaction ID recorded in the reception log exists in the license information holding unit 144 in the memory card 110 and corresponds to the license ID. If playback information exists and playback is not prohibited by the access restriction information held in the license information storage unit 144, that is, if playback is possible, the value "01h" is used. If the transaction ID exists in the license information holding unit and there is no corresponding playback information, or if playback is prohibited by the access restriction information held in the license information holding unit 144 and playback cannot be performed, It takes the value "0 0 h", and if there is no transaction ID, it takes the value "FF h".
  • the configuration of the data distribution system of the third embodiment is different from that of the second embodiment in that the operation of the controller 144 in the memory card 110 and the data held in the log memory 144 are the same as those of the second embodiment. Different from the case.
  • the distribution operation and the reconnection operation of the third embodiment are the same as the processing of the second embodiment, except for the second reconnection process described below, and therefore, description thereof will not be repeated.
  • FIGS. 21, 22, 23, and 24 show first, second, third, and fourth files for explaining the second reconnection operation in the data distribution system according to the third embodiment. It is a chart.
  • steps S300 to S338 are the same as the second reconnection operation of the second embodiment.
  • step S 338 the memory card 110 stores the received data supplied to the data bus BS 3 via the memory interface 1200 in the memory card 110 in the decoding processing unit 1404 and the holding unit 1402.
  • the controller 1420 in the memory card 1 10 sends the transaction ID in the reception log held in the log memory 1460.
  • the data stored in the license information holding unit 1440 is searched (step 640).
  • the controller 1420 first checks whether a transaction ID exists in the license information holding unit 1440 (step S642).
  • step S644 If the transaction ID does not exist, the license status flag is set to “FFh” (step S644), and the process proceeds to step S652.
  • step S 642 the controller 1420 further checks the state of the access restriction information AC 1 held in the license information holding unit 1440 and the corresponding license key in the memory 1415. It is checked whether or not K c has been recorded (step S646). If playback is possible, the license status flag is set to "01hj" (step S648), while if playback is not possible, the license status flag is set to "00h” (step S650). Then, the process proceeds to step S652.
  • the controller 1420 instructs the session key generating unit 1418 to generate the session key Ks 2 ′ generated at the time of the distribution operation in the memory mode (step S654).
  • the encryption processing circuit 14 ⁇ 6 encrypts the state information and the session key K s 2 ′ with the session key K s 1 to generate encrypted data ⁇ state information ⁇ K s 2 ′ ⁇ K sl (step S656 ) u
  • the controller 1420 obtains a hash value according to a hash function for the encrypted data ⁇ state information ⁇ K s 2 ' ⁇ K s 1, and obtains the encrypted data ⁇ state information // K s 2' ⁇ K s
  • the signature data h and ash for 1 are generated (step S658).
  • the encryption processing unit 1406 encrypts the signature data hash provided under the control of the controller 144 by the session key Ks1 provided from the decryption processing unit 1404 via the contact point Pa of the switching switch 1442. To generate encrypted signature data ⁇ hash ⁇ Ksl (step S660).
  • the data (state information // Ks2 ') Ksl and the encoded signature data ⁇ hash ⁇ Ksl generated as described above are output from the memory card 110 (step S6662).
  • the encrypted data output to the data bus BS3 ⁇ status information ⁇ Ks2 ' ⁇ Ks1 and the encrypted signature data ⁇ hash ⁇ Ksl are transmitted from the databus BS3 via the terminal 1202 and the memory interface 1200.
  • the message is transmitted to the mobile phone 100 and transmitted from the mobile phone 100 to the distribution server 30 (step S6664).
  • the distribution server 30 receives the encrypted data ⁇ state information // Ks2 ' ⁇ Ksl and the encrypted signature data ⁇ hash ⁇ Ksl (step S666).
  • decryption processing section 320 of distribution server 30 performs decryption processing on encrypted signature data ⁇ hash ⁇ Ksl using session key Ksl, and obtains encrypted data ⁇ state information ⁇ K s 2 ′ ⁇ Get the signature data hash for K s 1. Subsequently, the validity of the state information is checked from the encrypted data (state information ⁇ Ks2 ' ⁇ Ksl and the signature data) (step S668).
  • step S712 If the status information is not valid, the process ends (step S712), and if it is confirmed that the status information is valid, the decryption process is performed by the session key Ks1 and generated by the status information and the memory card.
  • the received session key KS2 ' is accepted (step S670).
  • the distribution control unit 315 checks the validity of the retransmission request for the reproduction information based on the received status information and the license distribution log (step S672). If it is determined that the reproduction information retransmission request is not valid, the second reconnection processing ends (step S712). On the other hand, if it is determined that the reproduction information retransmission request is valid, the distribution control unit 315 determines from the license distribution log the content ID, the access restriction information AC1, the reproduction circuit restriction information AC2, and the public encryption key KPm ( l) is obtained (step S674). Further, a license key Kc for decrypting the encrypted content data is obtained from the information database 304 (step S676).
  • the distribution control unit 315 gives the obtained license key Kc and the reproduction circuit restriction information AC2 to the encryption processing unit 324.
  • the encryption processing unit 324 encrypts the license key Kc and the reproduction circuit restriction information AC2 using the secret common key Kcom obtained from the Kcom holding unit 322 (step S678).
  • the encrypted data ⁇ Kc ⁇ AC2 ⁇ Kcom output from the encryption processing unit 324 and the transaction ID, content ID, and access restriction information AC1 output from the distribution control unit 315 are combined by the encryption processing unit 326. Then, it is decrypted with the public encryption key KPm (1) unique to the memory card 110 obtained in step S674 (step S680).
  • the encryption processing unit 328 receives the output of the encryption processing unit 326, and
  • Step S 682 Encrypt with the session key Ks 2 ′ generated in Step 10 (Step S 682) 0
  • the encrypted data output from the encryption processing unit 328 ⁇ Kc // AC 2 ⁇ Kcom // transaction ID ⁇ content ID ⁇ AC1 ⁇ Km (1) ⁇ Km2 (1) ⁇ is the data bus BS1 and the communication device. It is transmitted to the mobile phone 100 via 350 (step S684).
  • the mobile phone 100 receives the transmitted encrypted data ⁇ c // AC2 ⁇ Kcom ⁇ transaction ID ⁇ content ID ⁇ AC1 ⁇ Km (l) ⁇ Ks2 '(step S686).
  • memory interface 1 Referring to FIG. 24, in memory card 110, memory interface 1
  • the received data provided to the data bus BS3 via the data bus 200 is decoded by the decoding processing unit 1412. That is, the decryption processing section 141 2 decrypts the reception data on the data bus BS3 using the session key Ks2 ′ given from the session key generation section 1418 and outputs it to the data bus BS4 (step S690).
  • the data bus BS4 contains the data ⁇ Kc // AC 2 ⁇ Kconi ⁇ license ID ⁇ content ID that can be decrypted with the secret decryption key Km (1) held in the Km (1) holding unit 142 1 ⁇ AC1 ⁇ Km (l) is output
  • First decryption by public key key Km (l) Then, data ⁇ Kc; ⁇ AC2 ⁇ Kcom, transaction ID, content ID, and access restriction information AC1 are accepted (step S692).
  • Transaction ID, content ID, and access restriction information AC1 are recorded in the license information holding unit 1440.
  • the data ⁇ Kc: ⁇ AC2 ⁇ Kcom is again encrypted with the public key key KPm (l) and stored in the memory 14 15 as data ⁇ Kc // AC 2 ⁇ Kcom ⁇ Km (l). (Step S694).
  • reception state flag in the reception log in the log memory 1460 is changed to the off state indicating that the reception has been completed (step S696).
  • a request for distribution of content data is made from the mobile phone 100 to the distribution server 30 (step S698).
  • the distribution server 30 receives the content data distribution request and
  • step S700 From 304, encrypted content data ⁇ Data ⁇ Kc and additional information DATA-inf are obtained, and these data are output via data bus BS1 and communication device 350 (step S700).
  • the mobile phone 100 receives ⁇ Data ⁇ Kc: ⁇ Data-inf, and receives the encrypted content data ⁇ Data ⁇ Kc and the additional information Data-inf (step S702).
  • the encrypted content data ⁇ Data ⁇ Kc and the additional information Data-inf are transmitted to the data bus BS3 of the memory card 110 via the memory interface 120 ° and the terminal 1202.
  • the received encrypted content data ⁇ Data ⁇ Kc and the additional information Data-inf are stored in the memory 1415 as they are (step S704).
  • step S 706 a notification of the reception of the distribution is transmitted from the memory card 110 to the distribution server 30 (step S 706).
  • step S 708 the processing of terminating the distribution is executed (step S 708).
  • step S710 the processing of the distribution server ends (step S712).
  • step S654 all information of the state information is encrypted with the session key Ks1, and the distribution server 30 is encrypted by steps S622 and S624.
  • the encrypted data ⁇ state information ⁇ Ks2 ' ⁇ Ks1 is transmitted.
  • transaction ID in the state information is better if its source is clear rather than its secret. Therefore, since the source is clarified by the encrypted signature data ⁇ hash ⁇ Ksl, the transaction ID may not be encrypted and may be transmitted to the distribution server 30 as plain text. In this case, the state information is transmitted as transaction ID ⁇ (state information excluding transaction ID) ⁇ Ks2 ' ⁇ Ksl, and signature data hassh is generated for this.
  • the distribution server 30 and the mobile phone 100 are configured to perform encryption and decryption processing using the secret common key Kcom. It is also possible to adopt a configuration that does not use the encryption and decryption processing by.
  • the distribution server 30 included in the data distribution system of the first embodiment described with reference to FIG. 3 can be configured not to include the Kcom holding unit 322 and the encryption processing unit 324. is there. That is, in such a distribution server 30, the license key Kc and the reproduction circuit restriction information AC 2 output from the distribution control unit 3 15 are directly transmitted to the encryption processing unit 3 26.
  • a Kcom holding unit 1512 holding the secret common key Kcom and a decryption processing unit 1515 using the secret common key Kcom are provided. Is not provided.
  • the session key Ks 4 decryption processing unit that performs decryption processing by 4 Since the license key K is directly obtained by the above-described method, the license key K is directly provided to the decryption processing unit 1510.
  • the memory card 110 can be used as it is.
  • the content key Kc and the reproduction circuit restriction information AC2 are transmitted and held without being encrypted by the secret decryption key Kcom.
  • the operation is the same as that of the first to third embodiments, except that the corresponding decoding process is not required.
  • a data distribution system that can enjoy the same effects as those of the data distribution systems according to the first to third embodiments can be constructed even when the encryption process for the secret common key Kcom is not performed. Is possible.
  • the data ⁇ Kc ⁇ AC 2 ⁇ Kcom (or, in the configuration in which the key Kcom is omitted as described above, the data K c ⁇ AC 2) is used as the public key key K Pm (1)
  • the license information is stored in the license information storage unit 1440.
  • the license information is stored in the license information storage unit 1440 provided in the TRM, it is not always necessary to perform the re-encryption using the public encryption key KPm (1).
  • the same effect as in Examples 1 to 3 can be obtained by recording the information in 1440.
  • step S148 in FIG. 17 and step S370 in FIG. 20 are performed.
  • the “transaction ID, content ID, AC1, Kc ⁇ AC2 is stored in the license information holding unit. Will be recorded in You can change it.
  • the authentication data ⁇ KPm (1) ⁇ KPma and ⁇ KP p of the memory card and the mobile phone (content reproduction circuit) are used.
  • (1) ⁇ KPma is transmitted to the distribution server (step S104), and the distribution server receives (step S106), decrypts with the authentication key KPma (step S108), and, according to the decryption result, It has been explained that authentication processing is performed for both the memory card and the mobile phone (content reproduction circuit).
  • the content playback circuit does not necessarily have to be the mobile phone to which the music was played in order to play music, and ii) when playing back, even in the memory card.
  • the authentication data iKPm (1) ⁇ for the content playback circuit of the output destination is authenticated and distributed.
  • Authentication data of the content reproduction circuit in the server ⁇ KPm (1) ⁇
  • the authentication and verification data of the content reproduction circuit in the distribution server are two points in that the authentication processing of KPma does not lead to a decrease in security. ⁇ (1) ⁇ KPma authentication processing may not be performed.
  • step S 104 the portable telephone device transmits the authentication data ⁇ KPm (1) ⁇ KPma and the license purchase condition data AC of the content ID and the memory card, and the distribution server performs step S 104.
  • step S106 the authentication data ⁇ KPm (1) ⁇ of the content ID and the memory card are transmitted, and KPm, a and the license purchase condition data AC are transmitted.
  • step S108 the authentication data ⁇ KPm (1) ⁇ KPma is decrypted with the authentication key KPma and the public encryption key KPm (1) is accepted.
  • step S110 based on the decryption result or by making an inquiry to the authentication server, an authentication process is performed to determine whether or not the public encryption key KPm (1) is output from a valid device. Then, the memory card authentication data ⁇ KPm (1) ⁇ only needs to be changed to perform the subsequent processing according to the authentication result of KPma, and the playback processing is not changed at all.
  • the delivered information is stored by the memory card, but the present invention is not limited to such a case. That is, it has the same recording and encryption functions as the memory card described above. Then, the present invention can be applied to a more general recording device.
  • the recording device is not necessarily limited to a configuration that can be attached to and detached from a communication device such as a mobile phone like a memory card, and may be configured to be incorporated in the communication device.

Abstract

Cette invention concerne une carte mémoire (110) qui exécute une fonction d'authentification avec un serveur à partir de données conservées dans une zone de maintien de données d'authentification (1400). La carte mémoire (110) extrait une première clé de session (Ks1) et une transaction ID du serveur en décryptant des données figurant sur le bus de données (BS3). De plus, la carte mémoire (110) génère une seconde clé de session (Ks2) au moyen d'une section génératrice de clés (1418), crypte cette seconde clé de session (Ks2) et une clé (KPn(1)) propre à éa carte mémoire (110) avec la première clé de session (Ks1) et les transmet au serveur comme clé de cryptage de contenu lorsque la clé de contenu est décryptée. La transaction ID et la seconde clé de session (Ks2) contenues dans la mémoire de consignation (1460) sont utilisées au niveau de la redistribution.
PCT/JP2000/008544 1999-12-02 2000-12-01 Carte memoire et systeme de distribution de donnees faisant intervenir une telle carte WO2001041356A1 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US10/130,301 US7340055B2 (en) 1999-12-02 2000-12-01 Memory card and data distribution system using it
EP00978073A EP1237324A4 (fr) 1999-12-02 2000-12-01 Carte memoire et systeme de distribution de donnees faisant intervenir une telle carte
AU15574/01A AU1557401A (en) 1999-12-02 2000-12-01 Memory card and data distribution system using it
JP2001542505A JP3873090B2 (ja) 1999-12-02 2000-12-01 データ記録装置、データ供給装置およびデータ配信システム

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP11/343389 1999-12-02
JP34338999 1999-12-02

Publications (1)

Publication Number Publication Date
WO2001041356A1 true WO2001041356A1 (fr) 2001-06-07

Family

ID=18361144

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2000/008544 WO2001041356A1 (fr) 1999-12-02 2000-12-01 Carte memoire et systeme de distribution de donnees faisant intervenir une telle carte

Country Status (7)

Country Link
US (1) US7340055B2 (fr)
EP (1) EP1237324A4 (fr)
JP (1) JP3873090B2 (fr)
CN (1) CN1277364C (fr)
AU (1) AU1557401A (fr)
TW (1) TW493333B (fr)
WO (1) WO2001041356A1 (fr)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1286243A2 (fr) * 2001-08-15 2003-02-26 Fujitsu Limited Système de distribution et de transmission hors ligne de licences d'utilisation
WO2004012085A1 (fr) * 2002-07-25 2004-02-05 Sanyo Electric Co., Ltd. Dispositif de stockage de donnees pouvant stocker des ensembles multiples d'informations historiques concernant des traitements d'entree/sortie de donnees de securite sans duplication
WO2004019552A1 (fr) * 2002-08-20 2004-03-04 Koninklijke Philips Electronics N.V. Authentification de reseau mobile pour protection de contenus memorises
JP2005080315A (ja) * 2003-09-03 2005-03-24 Fr Telecom サービスを提供するためのシステムおよび方法
JP2006520040A (ja) * 2003-03-10 2006-08-31 ギーゼッケ ウント デフリエント ゲーエムベーハー 携帯型データ・キャリアへのメディア・データのローディング
US7472123B2 (en) 2002-03-05 2008-12-30 Ntt Docomo, Inc. Server device, communication device, and program for managing contents usage
US7716746B2 (en) 2002-03-05 2010-05-11 Sanyo Electric Co., Ltd. Data storing device for classified data
KR100957269B1 (ko) * 2002-01-15 2010-05-12 산요덴키가부시키가이샤 기밀 데이터의 입출력을 정확하게 재개 가능한 기억 장치
US7770227B2 (en) 2004-11-26 2010-08-03 Panasonic Corporation Right information management method and right information management device
JP2010541068A (ja) * 2007-09-28 2010-12-24 サンディスク コーポレイション デジタルコンテンツ配布のためのシステムおよび方法
CN102143486A (zh) * 2010-01-28 2011-08-03 骆建军 一种采用存储卡进行手机加密通信的实现方式
US9083685B2 (en) 2009-06-04 2015-07-14 Sandisk Technologies Inc. Method and system for content replication control

Families Citing this family (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
MY123388A (en) * 1999-03-15 2006-05-31 Sony Corp Processing method and apparatus for encrypted data transfer
ATE265787T1 (de) * 2000-03-10 2004-05-15 Rudolf Ritter Verfahren, kommunikationssystem und empfangsvorrichtung für die verrechnung von zugriffskontrollierten programmen und/oder daten von broadcastsendern
JP2002202389A (ja) * 2000-10-31 2002-07-19 Sony Corp 時計情報内容配信処理システム、情報配信装置、情報配信システム、携帯端末装置、情報記録媒体及び情報処理方法
JP2002297478A (ja) * 2001-03-29 2002-10-11 Toshiba Corp マルチメディアデータ中継システム、マルチメディアデータ中継装置及びマルチメディアデータ中継方法
US7421411B2 (en) * 2001-07-06 2008-09-02 Nokia Corporation Digital rights management in a mobile communications environment
JP4326186B2 (ja) * 2002-04-15 2009-09-02 ソニー株式会社 情報処理装置および方法
JP2004265139A (ja) * 2003-02-28 2004-09-24 Nec Corp コンテンツ実行システム、携帯情報端末、外部機器、コンテンツ実行方法及びプログラム
US20040202052A1 (en) * 2003-04-08 2004-10-14 Eitan Lev Electronic jewelry with downloadable images
US11063766B2 (en) 2003-06-13 2021-07-13 Ward Participations B.V. Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data
WO2004111751A2 (fr) * 2003-06-13 2004-12-23 Orbid Limited Procede et systeme permettant d'effectuer une transaction et une verification portant sur l'utilisation legitime de donnees numeriques
JP2005078161A (ja) * 2003-08-28 2005-03-24 Canon Inc 記録装置
US8229118B2 (en) * 2003-11-07 2012-07-24 Qualcomm Incorporated Method and apparatus for authentication in wireless communications
JP4613487B2 (ja) * 2003-11-07 2011-01-19 ソニー株式会社 電子機器、情報処理システム、情報処理装置および方法、プログラム、並びに記録媒体
JP2007517350A (ja) * 2003-12-19 2007-06-28 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ 記憶装置のデータコンテンツにアクセスする方法
WO2005074187A1 (fr) * 2004-01-29 2005-08-11 Sony Corporation Dispositif et méthode de traitement de l'information
CN1914679A (zh) * 2004-02-04 2007-02-14 皇家飞利浦电子股份有限公司 授权用户获得对以加密形式存储在存储介质上的内容的访问权的设备和方法
US7703141B2 (en) * 2004-03-11 2010-04-20 Microsoft Corporation Methods and systems for protecting media content
NZ549544A (en) * 2004-03-22 2008-03-28 Samsung Electronics Co Ltd Method and apparatus for digital rights management using certificate revocation list
KR101043336B1 (ko) * 2004-03-29 2011-06-22 삼성전자주식회사 디바이스와 휴대형 저장장치간의 디지털 권리객체에 관한정보의 획득 및 제거를 위한 방법 및 장치
JP4561146B2 (ja) * 2004-03-29 2010-10-13 ソニー株式会社 コンテンツ流通システム、暗号化装置、暗号化方法、情報処理プログラム、及び記憶媒体
US20060242406A1 (en) * 2005-04-22 2006-10-26 Microsoft Corporation Protected computing environment
US8312267B2 (en) 2004-07-20 2012-11-13 Time Warner Cable Inc. Technique for securely communicating programming content
US8266429B2 (en) 2004-07-20 2012-09-11 Time Warner Cable, Inc. Technique for securely communicating and storing programming material in a trusted domain
US20070106616A1 (en) * 2005-02-07 2007-05-10 Motoji Ohmori License information management apparatus and license information management method
JP4907880B2 (ja) * 2005-02-23 2012-04-04 株式会社エヌ・ティ・ティ・ドコモ 携帯情報端末およびデータ保護方法
US9436804B2 (en) 2005-04-22 2016-09-06 Microsoft Technology Licensing, Llc Establishing a unique session key using a hardware functionality scan
US9363481B2 (en) * 2005-04-22 2016-06-07 Microsoft Technology Licensing, Llc Protected media pipeline
JP4935015B2 (ja) * 2005-07-29 2012-05-23 ソニー株式会社 コンテンツ配信システム,コンテンツ配信方法,コンテンツ送信端末およびコンテンツ受信端末
CN101243469A (zh) * 2005-08-22 2008-08-13 微软公司 从第一平台到第二平台的数字许可证迁移
US7805375B2 (en) * 2005-08-22 2010-09-28 Microsoft Corporation Digital license migration from first platform to second platform
JP4755472B2 (ja) * 2005-09-29 2011-08-24 ヒタチグローバルストレージテクノロジーズネザーランドビーブイ データ転送方法及びシステム
JP2007102431A (ja) * 2005-10-03 2007-04-19 Sony Corp データ移動方法、データ移動元装置、データ移動先装置、データ移動プログラム及び移動データ記録プログラム
US8306918B2 (en) 2005-10-11 2012-11-06 Apple Inc. Use of media storage structure with multiple pieces of content in a content-distribution system
US8224751B2 (en) 2006-05-03 2012-07-17 Apple Inc. Device-independent management of cryptographic information
CN101165698B (zh) * 2006-10-17 2011-07-27 华为技术有限公司 一种导出许可的方法及系统
US8520850B2 (en) 2006-10-20 2013-08-27 Time Warner Cable Enterprises Llc Downloadable security and protection methods and apparatus
US8621540B2 (en) 2007-01-24 2013-12-31 Time Warner Cable Enterprises Llc Apparatus and methods for provisioning in a download-enabled system
KR20090000184A (ko) * 2007-01-25 2009-01-07 삼성전자주식회사 유비쿼터스 오디오 재생 및 서비스 방법 및 시스템
US8347098B2 (en) * 2007-05-22 2013-01-01 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US9311492B2 (en) 2007-05-22 2016-04-12 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US9866609B2 (en) 2009-06-08 2018-01-09 Time Warner Cable Enterprises Llc Methods and apparatus for premises content distribution
US9602864B2 (en) 2009-06-08 2017-03-21 Time Warner Cable Enterprises Llc Media bridge apparatus and methods
JP2011081764A (ja) * 2009-09-14 2011-04-21 Panasonic Corp コンテンツ受信機、コンテンツ再生機、コンテンツ再生システム、コンテンツ書き出し方法、視聴期限判定方法、プログラム、および記録媒体
US20110110516A1 (en) * 2009-11-06 2011-05-12 Kensuke Satoh Content receiver, content reproducer, management server, content use system, content use method, method of write-out from content receiver, method of possible viewing time management on content reproducer, method of time limit fixation in management server, and program
US9906838B2 (en) 2010-07-12 2018-02-27 Time Warner Cable Enterprises Llc Apparatus and methods for content delivery and message exchange across multiple content delivery networks
US9565472B2 (en) 2012-12-10 2017-02-07 Time Warner Cable Enterprises Llc Apparatus and methods for content transfer protection
US20140282786A1 (en) 2013-03-12 2014-09-18 Time Warner Cable Enterprises Llc Methods and apparatus for providing and uploading content to personalized network storage
US9621940B2 (en) 2014-05-29 2017-04-11 Time Warner Cable Enterprises Llc Apparatus and methods for recording, accessing, and delivering packetized content
WO2016040381A1 (fr) * 2014-09-08 2016-03-17 Universidad Politecnica De Puerto Rico Procédé pour un échange de documents sécurisé
US20160105400A1 (en) * 2014-10-08 2016-04-14 Time Warner Cable Enterprises Llc Apparatus and methods for data transfer beteween a plurality of user devices
US11362824B2 (en) * 2018-05-25 2022-06-14 Intertrust Technologies Corporation Content management systems and methods using proxy reencryption

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11224288A (ja) * 1998-02-06 1999-08-17 Hitachi Ltd 利用条件販売型デジタルコンテンツ販売電子モールシステム
JP2000253453A (ja) * 1999-03-01 2000-09-14 Sony Corp データ受信端末装置及びデータ受信方法
JP2000268096A (ja) * 1999-03-18 2000-09-29 Dainippon Printing Co Ltd コンテンツ配信システム及びそのサーバ

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69324915T2 (de) * 1993-08-10 1999-12-02 Audio Digital Imaging Inc Verfahren zur Echtheitsprüfung von fälschungssicheren Video-Identifizierungsdaten
KR100332743B1 (ko) * 1994-11-26 2002-11-07 엘지전자주식회사 디지탈영상시스템의불법시청및복사방지방법및장치
JPH0974549A (ja) 1995-07-05 1997-03-18 Toshiba Corp 課金システム装置
KR0166923B1 (ko) * 1995-09-18 1999-03-20 구자홍 디지탈 방송 시스템의 불법 시청 및 복사 방지방법 및 장치
JP3474075B2 (ja) 1997-04-07 2003-12-08 富士通株式会社 複数の記録媒体上へのデータ記録方法および装置
JP3994518B2 (ja) 1998-05-11 2007-10-24 ソニー株式会社 データ配信装置およびデータ配信用の端末装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11224288A (ja) * 1998-02-06 1999-08-17 Hitachi Ltd 利用条件販売型デジタルコンテンツ販売電子モールシステム
JP2000253453A (ja) * 1999-03-01 2000-09-14 Sony Corp データ受信端末装置及びデータ受信方法
JP2000268096A (ja) * 1999-03-18 2000-09-29 Dainippon Printing Co Ltd コンテンツ配信システム及びそのサーバ

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7191155B2 (en) 2001-08-15 2007-03-13 Fujitsu Limited License transmitting and distributing system under offline environment and method thereof
EP1286243A3 (fr) * 2001-08-15 2003-09-17 Fujitsu Limited Système de distribution et de transmission hors ligne de licences d'utilisation
EP1286243A2 (fr) * 2001-08-15 2003-02-26 Fujitsu Limited Système de distribution et de transmission hors ligne de licences d'utilisation
US7752461B2 (en) 2002-01-15 2010-07-06 Sanyo Electric Co., Ltd. Storage apparatus that can properly recommence input and output of classified data
KR100957269B1 (ko) * 2002-01-15 2010-05-12 산요덴키가부시키가이샤 기밀 데이터의 입출력을 정확하게 재개 가능한 기억 장치
US7472123B2 (en) 2002-03-05 2008-12-30 Ntt Docomo, Inc. Server device, communication device, and program for managing contents usage
US7716746B2 (en) 2002-03-05 2010-05-11 Sanyo Electric Co., Ltd. Data storing device for classified data
CN100343831C (zh) * 2002-07-25 2007-10-17 三洋电机株式会社 能够不重叠地存储多个历史信息项的数据存储设备
WO2004012085A1 (fr) * 2002-07-25 2004-02-05 Sanyo Electric Co., Ltd. Dispositif de stockage de donnees pouvant stocker des ensembles multiples d'informations historiques concernant des traitements d'entree/sortie de donnees de securite sans duplication
US7650328B2 (en) 2002-07-25 2010-01-19 Sanyo Electric Co., Ltd. Data storage device capable of storing multiple sets of history information on input/output processing of security data without duplication
WO2004019552A1 (fr) * 2002-08-20 2004-03-04 Koninklijke Philips Electronics N.V. Authentification de reseau mobile pour protection de contenus memorises
US7702921B2 (en) 2003-03-10 2010-04-20 Giesecke & Devrient Gmbh Loading media data into a portable data carrier
JP2006520040A (ja) * 2003-03-10 2006-08-31 ギーゼッケ ウント デフリエント ゲーエムベーハー 携帯型データ・キャリアへのメディア・データのローディング
JP2005080315A (ja) * 2003-09-03 2005-03-24 Fr Telecom サービスを提供するためのシステムおよび方法
US7770227B2 (en) 2004-11-26 2010-08-03 Panasonic Corporation Right information management method and right information management device
JP2010541068A (ja) * 2007-09-28 2010-12-24 サンディスク コーポレイション デジタルコンテンツ配布のためのシステムおよび方法
US8761402B2 (en) 2007-09-28 2014-06-24 Sandisk Technologies Inc. System and methods for digital content distribution
US9083685B2 (en) 2009-06-04 2015-07-14 Sandisk Technologies Inc. Method and system for content replication control
CN102143486A (zh) * 2010-01-28 2011-08-03 骆建军 一种采用存储卡进行手机加密通信的实现方式

Also Published As

Publication number Publication date
US7340055B2 (en) 2008-03-04
EP1237324A1 (fr) 2002-09-04
CN1433608A (zh) 2003-07-30
AU1557401A (en) 2001-06-12
JP3873090B2 (ja) 2007-01-24
US20020184154A1 (en) 2002-12-05
EP1237324A4 (fr) 2008-12-10
CN1277364C (zh) 2006-09-27
TW493333B (en) 2002-07-01

Similar Documents

Publication Publication Date Title
JP3873090B2 (ja) データ記録装置、データ供給装置およびデータ配信システム
JP3759455B2 (ja) データ再生装置
JP3677001B2 (ja) データ配信システムおよびそれに用いられる記録装置
JP3930321B2 (ja) データ配信システムおよびそれに使用される記録装置
JP3980355B2 (ja) ライセンス情報記憶装置、コンテンツ再生装置およびライセンス情報配信システム
JP4010481B2 (ja) データ配信システムおよびそれに用いるデータ供給装置、端末装置ならびに記録装置
JP2002094499A (ja) データ端末装置およびヘッドホン装置
JP2002353952A (ja) データ端末装置
WO2002075550A1 (fr) Enregistreur de donnees restituant des donnees originales autorisees a n'exister qu'en un seul exemplaire
JP2003022219A (ja) コンテンツデータを容易に再取得できるデータ端末装置、その端末装置において実行されるプログラム、およびそのプログラムを記録した記録媒体
JP3934941B2 (ja) 記録装置
JP2004133654A (ja) 記憶装置、端末装置およびサーバ装置
JP3782356B2 (ja) 記録装置およびそれを用いたデータ配信システム
JP4553472B2 (ja) データ端末装置
JP3851155B2 (ja) ライセンス移動システム、ライセンス管理サーバおよびデータ端末装置
JP2002094500A (ja) データ端末装置
JP2002099509A (ja) 携帯端末装置
JP2002091456A (ja) 携帯電話機およびそれに用いるアダプタ
JP2002009763A (ja) データ再生装置、それを用いた端末装置、および再生方法
JP2001265742A (ja) 配信システム
WO2001063834A1 (fr) Enregistreur et systeme de distribution utilisant celui-ci
JP2001265939A (ja) 配信システム
WO2001091365A1 (fr) Systeme de distribution de donnees
JP2002099743A (ja) データ再生装置およびライセンス管理方法
JP4540202B2 (ja) データ再生装置およびデータ端末装置

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref country code: JP

Ref document number: 2001 542505

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 10130301

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2000978073

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 00818755X

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 2000978073

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642